MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 64372c3ad1a4fff52786f20761db9c67605a533f0b5c48311b9cb005c24e0314. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DCRat


Vendor detections: 7


Intelligence 7 IOCs YARA 2 File information Comments 1

SHA256 hash: 64372c3ad1a4fff52786f20761db9c67605a533f0b5c48311b9cb005c24e0314
SHA3-384 hash: 9e05e554a20bc4eeea57f6d33d6b3292061b91ed172c1aff3a383c5ec6b0bb232b910588ae81baa3b6c13e0f9ac98615
SHA1 hash: 7a2b49a9dd56a804fa881943c21b821874a35a2c
MD5 hash: 840eb0664fe0d3fa68c8f16e0b1d970e
humanhash: edward-beryllium-leopard-oven
File name:840eb0664fe0d3fa68c8f16e0b1d970e
Download: download sample
Signature DCRat
File size:1'105'920 bytes
First seen:2021-07-29 11:29:42 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'610 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 24576:J/TSQLWxRjh4VWf+zdlOGIFkx32zAP3kppIDD+4:JteRoWGzW/kdbtm
TLSH T1A73507023684DD02D06D1637CAEF841807A8ED0B7B62DB1B7E9E3B9D64563A74D1E1CE
Reporter zbetcheckin
Tags:32 DCRat exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
105
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
HwdiMonitor_protected.exe
Verdict:
Malicious activity
Analysis date:
2021-07-26 19:49:23 UTC
Tags:
loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Creates an autostart registry key pointing to binary in C:\Windows
Creates an undocumented autostart registry key
Creates multiple autostart registry keys
Drops executables to the windows directory (C:\Windows) and starts them
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Sigma detected: Execution from Suspicious Folder
Sigma detected: Schedule system process
Tries to harvest and steal browser information (history, passwords, etc)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected DCRat
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 456178 Sample: c2COmS3iR6 Startdate: 29/07/2021 Architecture: WINDOWS Score: 100 57 Multi AV Scanner detection for dropped file 2->57 59 Multi AV Scanner detection for submitted file 2->59 61 Yara detected DCRat 2->61 63 6 other signatures 2->63 7 c2COmS3iR6.exe 14 22 2->7         started        12 UsoClient.exe 3 2->12         started        14 wermgr.exe 3 2->14         started        16 9 other processes 2->16 process3 dnsIp4 53 192.168.2.1 unknown unknown 7->53 45 C:\Windows\System32\cryptdlg\UsoClient.exe, PE32 7->45 dropped 47 C:\Users\Public\Documents\WmiPrvSE.exe, PE32 7->47 dropped 49 C:\PerfLogs\wermgr.exe, PE32 7->49 dropped 51 9 other malicious files 7->51 dropped 69 Creates an undocumented autostart registry key 7->69 71 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 7->71 73 Creates multiple autostart registry keys 7->73 81 3 other signatures 7->81 18 cmd.exe 7->18         started        21 schtasks.exe 1 7->21         started        23 schtasks.exe 1 7->23         started        25 3 other processes 7->25 75 Multi AV Scanner detection for dropped file 12->75 77 Machine Learning detection for dropped file 12->77 55 188.120.254.68, 49719, 49724, 49725 THEFIRST-ASRU Russian Federation 16->55 79 Tries to harvest and steal browser information (history, passwords, etc) 16->79 file5 signatures6 process7 signatures8 65 Uses ping.exe to sleep 18->65 67 Uses ping.exe to check the status of other devices and networks 18->67 27 conhost.exe 18->27         started        29 chcp.com 18->29         started        31 PING.EXE 18->31         started        33 WmiPrvSE.exe 18->33         started        35 conhost.exe 21->35         started        37 conhost.exe 23->37         started        39 conhost.exe 25->39         started        41 conhost.exe 25->41         started        43 conhost.exe 25->43         started        process9
Gathering data
Threat name:
ByteCode-MSIL.Backdoor.LightStone
Status:
Malicious
First seen:
2021-07-27 12:59:24 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
37 of 46 (80.43%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:dcrat infostealer persistence rat spyware stealer
Behaviour
Creates scheduled task(s)
Modifies registry class
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Adds Run key to start application
Reads user/profile data of web browsers
Executes dropped EXE
DCRat Payload
DcRat
Modifies WinLogon for persistence
Unpacked files
SH256 hash:
6cc193edc81d0e76542dd669a39dc8983d6e1a9154ac487503cbb66b79afc79a
MD5 hash:
2a53974d338229cf9da8cba1e063b050
SHA1 hash:
c47e28c4d2a6810ded53d9fbe2dd5ee46ddb45d7
SH256 hash:
64372c3ad1a4fff52786f20761db9c67605a533f0b5c48311b9cb005c24e0314
MD5 hash:
840eb0664fe0d3fa68c8f16e0b1d970e
SHA1 hash:
7a2b49a9dd56a804fa881943c21b821874a35a2c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

DCRat

Executable exe 64372c3ad1a4fff52786f20761db9c67605a533f0b5c48311b9cb005c24e0314

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-07-29 11:29:44 UTC

url : hxxp://194.226.139.141/brokerhostperffontSavesdhcp.exe